‘Hosted by’ statement: This webinar series is graciously hosted by ActZero, a contributing member of the Blueprint for Ransomware Defense working group. Hosting this webinar does not constitute endorsing or promoting any participants’ solutions.
Now that you’ve inventoried your assets and built a strong foundation for protecting your devices, network, and people, it’s time to add the next layer of Safeguards. This 3rd session of our 5-part series focuses on the actionable Safeguards required to block a ransomware attack.
Watch Karen Evans (CRI), Brian Cute (GCA), Shehzad Mirza (CyberWA), and Josh Franklin (CIS) as they discuss the set of practices an enterprise must implement to manage devices and the people who use them effectively.
In the session, you’ll learn the following:
- Best practices for software management
- Practitioner advice on managing access controls and the tools to help out
- How identity protection plays such an essential role in ransomware defense, and why multifactor authentication is a game changer to your security
- Methods for optimizing vulnerability and patch management processes
The resources referenced in this webinar are:
- Blueprint for Ransomware Defense
- CXO Insights: Blueprint for Ransomware Defense
- Complimentary Ransomware Readiness Assessment
- Ransomware Task Force Report
- GCA Cybersecurity Toolkit for Small Business
- CIS Critical Security Controls
- Cyber Readiness Program
- Cyber Readiness Starter Kit - Cybersecurity Awareness Workforce Training
- Cyber Leader Program